Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
e25b1e62fcf11d0c244b3f5a60729124_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e25b1e62fcf11d0c244b3f5a60729124_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e25b1e62fcf11d0c244b3f5a60729124_JaffaCakes118.html
-
Size
36KB
-
MD5
e25b1e62fcf11d0c244b3f5a60729124
-
SHA1
bfdcd8ab41656a0c3c1948f197cf37a7ac8180eb
-
SHA256
4ef2feb9d7411b374f4d5f12a8deaa1303e67b967e50a2d2c9112366e788aa00
-
SHA512
4feab2a1f68dc3d71f678386df6505b0ae4c2d16e8944e908b17b553ab948f55f143ad19588203cd2046522668fc4df70a29abcc211acf7274b0dbbce4f8b8b1
-
SSDEEP
768:zwx/MDTHh588hARCZPXjRE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRf:Q/UkbJxNVuu0Sx/c8RK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000013a0e4a5e300adef743eb328d68b2da34f06b6f1f16aac64ad9b54afcbf6c5ca000000000e8000000002000020000000c89dad927a15b9eda41db9bb9438a75cecb2a64a61a666a73f1c8c5d78db675720000000f7390c60b351926b8bb4edf76352d6b17ba63354fba52f20e0d7e7a75380c3bd4000000046451cffe1242a59f7d1888e0547ccdcb3729ee3da27735385c99d91cdf1b9898a1a4e212dae99cc9ed1750ee016fe5404859cc3890ee379d0d9991eb7678e66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0296bb76007db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432560817" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD35C881-7353-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 1740 2712 iexplore.exe 30 PID 2712 wrote to memory of 1740 2712 iexplore.exe 30 PID 2712 wrote to memory of 1740 2712 iexplore.exe 30 PID 2712 wrote to memory of 1740 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e25b1e62fcf11d0c244b3f5a60729124_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87b8fb1636ee8dc604d5eda9f599d59
SHA1cd127239529d7986d3fb25c3ce77df3cbca4ca90
SHA25690e415b687803b0cded9f8b924231b8c2578a1fee3145eb09dbeb1f0873ef795
SHA5128e70d37cad2fd732ee2b251472c61b060a74f08234d9f0fccbb4161b6e8fbf88f339af0992c3cecb2bca51140899622b1805c1302896b4563cb8b92ad5f2431c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffacca132e3d06529f72fecfd9a92130
SHA115aea16f7c8b41123765c55e8795ee5800498db5
SHA256cf133025482b15b83b568e99bf6f6057200611610f942ac5aede5691614c8c36
SHA51222ade4afb913bbd71b2c96ff8cc3a5c8f853e9824fd38966c5331fc90fbe39d4162ccd2650c2bc6570b99fa6868c5f4d892d12801fb93285dab84209a7756d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b08b72ca89ff03f6a8b56f6667fa1f8
SHA150a679132e0d6a72b0ab578d92ccfa9858fd68ac
SHA256761a0f5b8338d22eba8f1a63a704ff5f9ba1921d3af1d0ea26c7c69297da4e4d
SHA5123cf37dc0c45d07ad90bb4647d7a8997fafae58a42eac79fc1c62204d4b435fda9031e8727227fa232a81e8489c6369babf10ba6c911a51c951831bca64f2937a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1439e8900c57ec8c0587865a80fe00
SHA11566583f0cccdbe17ddfa8e79ab4492d5fb417fa
SHA256a9975af7e700fa1983868512a233e0bda28b822ae86c82625ff05814071d9496
SHA5123c20fb3dafdd272223746a883e9177e8867457e9aa2c96fabcd0faff623c378d7abd1656a3f5cb4efd410e7ed50d60313900a805c04e7aa628f7e31fdc96dde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586842532bbd3c216a9dd7e4c207b0dc1
SHA19c0a70469473d4b3a3cb5470ad557aff9856d62d
SHA256ee14400fbf63d5a8b9b094ef6e0b9ff77d8f5e18ef908b0d870dbdea6db13de2
SHA512813ffc4d0e05a4ab48218ec8651730031d90404021d8fb00347c447fe7bf3c980cc2883239910ae6d8cb27b4f81659c3611bf40c255046c2c4acc86e74c37ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5901155a857674138967c4e00f45ce
SHA106a8f24e080358eab8f564e90fae0efd8a6a67fb
SHA2563c915474583b2f918d3def91afbc019f7e27c7c642af939b337145fb94fba268
SHA5128fa203284fe76b8de71b188105edc132e4c3edaf1c25ca27e9c60100e5251e2aab45a39b301629b9bc9e5d0c5262c627393486620a2edccb4aead8bead20efca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b188caf2d4e7314104f2463d77ac9fbc
SHA199d849b6aa5ce924e00279603c1c18df29d32497
SHA2562b6e922009059f7f405ddb00123da1a51e21ac5e07427e205c3974165383eeff
SHA512c80a5205af10164dee1f4097bad6164ba7f47cf56430f55cf5302b2f01c355b096d740a489275505e4ed6d07ee030ab876aafd64f48dddae1ccf36ed050e69c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2baad068506350751a1bc3008dd00f
SHA164ae55842a8ef6006697b1aaa2f4615395a02f38
SHA256af632f7ac95459032367de6255f68bcda8672929f615c9d0806d0fe3872d8d02
SHA512ff7d826abba5057fb0b9eeb0798e3c2e434e466dbcaafcb59995b1f5d52d60cc99672473555f014b99bf0181991ad46ec81690264eec20cf87f4519601ffce86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4379879c8d10658b250cf652cbf3a8
SHA172749d027281dfb86df2068ad963293369384663
SHA256fa2420664e698884ce860519132e87c0f2854d7a2f84995286923e4c13448bb7
SHA5121e36da0d56a71508c1ddaff228b3511b04036009eb3eeea70ddc636d1937ad5f935a9d92986de5c98f03860fb41380617df98f8db6f7a073e5bd1cbdda7175bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50354a4b643ec0c1994bcbf26bc34bb7a
SHA1407edd7be160bedf093f8d6e7e36df2e1a8eec70
SHA256c8fcaf5fc09abdff62790912c1b0bfb6e31871f2ad9595686c6467372a192999
SHA5128350a0ba466c58797748d5567fb137fc8d0aeed6b141047f1f75a46411f6b5f3174c8dae45340e4fbb5d33fee677bad81cf5fbd16b76f036cd0070fcc5c5af5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e06ccdbf63388544b3d643496181a9d
SHA15aa9a4f344c37fef267e822906e9b80d8ae7c3f8
SHA256fcfd8822ef9f05437f8c0472e0664c09ce2624dad80bd3738b60e499948c1a36
SHA512a1e6449896b5b62c49ddf45d76a739210d845a13a44e0535a9b03d1cd49cf666efb3403d29a440d2b2c1da03754c20eb6d7bbb8a75783cd8cc6d3f038275cdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7f703046dcef56f8dd96e74ba80159
SHA12eae69cc029d9bd3c7e6fd4f0bfe6a4673c125cd
SHA2568567a12e3b668cd815f69050afab3fdf9320599f638c89155b9961c24bfe4f81
SHA5122844217131ea3b5e257a6b71d3f1bca4760b5ebdcf5fff6a03877194215a3b6bc92fbe856772cb2e6b3ef4a79ffb6d515aef8f0aef81646ea501342c8d5b6bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD52c54e134f7b73fb7a2e0bac40da9ad42
SHA1246e7b2a81b539ce83ebe44c728779ba1d29c22c
SHA256b611fee4c01b07e8d508c2d207ca517f12f61a05cd9268870325e6a46678c618
SHA512166960b2e6a7b917538b979a23943dfc24c241ab99776755a270e0904a7bda04f5a2688dd95368ae555f858409e3dc8f4beddd4babc4eb1fd9e657f1d23c8e84
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\ae111d25cbb9b2d7293e8bdb2fcfe8b3[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b